Saturday, August 14, 2010
Dangerous iPhone exploit code goes public
"Comex", the developer of JailbreakMe 2.0, posted source code for the hacks that leveraged two vulnerabilities in iOS and allowed iPhone owners to install unauthorized apps. Minutes after Apple issued a security update Wednesday, the maker of a 10-day-old jailbreak exploit released code that others could put to use hijacking iPhones, iPod Touches and iPads.
The exploits that comex used to jailbreak the iOS could be used for other purposes, including delivering malicious payloads to grab control of iPhones, iPads , and iPod Touches. All that would be necessary is for hackers to dupe users into visiting a malicious Web site or persuading them to click on a link in an e-mail or text message.
"Impressive. And dangerous", said Mikko Hypponen , chief research officer at antivirus company F-Secure, on Twitter early today of the exploit code.
It may not be long before comex's work is turned into a weapon for attacks that gain root access, or complete control, of iPhones and iPads.
"@comex thanks, using it to make malicious s*** now," bragged someone identified as "MTWomg" on Twitter shortly after comex published the source code.
Noted Mac vulnerability researcher Dino Dai Zovi, co-author of The Mac Hackers Handbook , chimed in with a warning of his own. "Now that @comex released his jailbreak source, any bets on how long before it is ported to Metasploit?" Dai Zovi tweeted Wednesday.
Metasploit is the open-source penetration testing framework that some use as a hacking toolkit.
Apple did not patch 2007's first-generation iPhone or iPod Touch yesterday, delivering the update only to the iPhone 3G or later running the iOS 2.0 or later, and to the second-generation iPod Touch or later running iOS 2.1 or later. Lacking patches, those early models may be vulnerable to attack.
Also possibly at risk: Mac OS X. Like iOS, Apple's desktop operating system includes the FreeType font engine, which may be vulnerable to the same or a similar exploit.
And users who have used comex's code to jailbreak their iPhones have a decision to make. If they accept Wednesday's update, they lose the ability to install and run software not approved by Apple. But by ignoring the update, they may be victimized by future attacks based on the public code.
Security experts urged everyone, jailbreakers included, to apply the update.
"We recommend that all iOS users, including those who have jailbroken their devices, would install the latest update now," Hypponen said in a blog post Wednesday.
Users can download the iOS update by connecting their iPhone, iPod Touch or iPad to their PC or Mac, running iTunes, clicking on the device in the listing on the left and then clicking the "Check for Update" button.
How to hack someone with their IP
Sup, 0chena here, i didn't make this tutorial, so if you didn't understand it, please don't private message me, make a thread in the help section, thanks.
Introduction
1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know.
1. Hardware and Firmware
1a. The BIOS
The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access.
NOTE that the BIOS is not a software program, insofar as it is not purged from memory when you turn off the computer. It's
firmware, which is basically software on a chip.
A convenient little feature that most BIOS manufacturers include is a startup password. This prevents access to the system until you enter the correct password.
If you can get access to the system after the password has been entered, then there are numerous software-based BIOS password extractors available from your local H/P/A/V site.
NETBIOS/NBTSTAT - What does it do?
2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster.
Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT
Method 2:Start>Run>Type Command>Type NBTSTAT
(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)
Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following:
NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying
statistics.
C:\WINDOWS\DESKTOP>
The only two commands that are going to be used and here they are:
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Host Names
3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example.
123-fgh-ppp.internet.com
there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference.
abc-123.internet.com
ghj-789.newnet.com
these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server.
123-fgh-ppp.internet.com
567-cde-ppp.internet.com
IP Addresses
4. You can resolce these host names if you want to the IP address (Internet Protocol)
IP addresses range in different numbers. An IP looks like this:
201.123.101.123
Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP.
24.18.18.10
on dialup connections IP's are higher, like this:
208.148.255.255
notice the 208 is higher than the 24 which is the cable connection.
REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS.
Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command.
Getting The IP Through DC (Direct Connection)
5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are:
Sending a file to their computer you are directly connected.
AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.
ICQ when sending a file or a chat request acception allows a direct connection.
Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.)
Voice Chatting on Yahoo establishes a direct connection.
If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement.
If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly
connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
The first line indicated the Protocol (language) that is being used by the two computers.
TCP (Transfer Control Protocol) is being used in this and is most widely used.
Local address shows your IP address, or the IP address of the system you on.
Foreign address shows the address of the computer connected to yours.
State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states.
the way you know the person is directly connected to your computer is because of this:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name:
abc-123-ppp.webnet.com
If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc-123-ppp.webnet.com host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack!
Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know.
IMPORTANT, READ NOW!!!
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Remember this?
Time to use it.
-a will be the host name
-A will be the IP
How do i know this?
Read the Statements following the -a -A commands. It tells you there what each command takes.
So have you found which one you have to use?
GOOD!
Time to start.
Using it to your advantage
6. Type this if you have the host name only.
NBTSTAT -a (In here put in hostname without parenthesis)
Type this is you have the IP address only.
NBTSTAT -A (In here put in IP address without parenthesis)
Now, hit enter and wait. Now Either one of two things came up
1. Host not found
2. Something that looks like this:
--------------------------------------------
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
GMVPS01 <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
GMVPS01 <03> UNIQUE Registered
GMVPS01 <20> UNIQUE Registered
WORKGROUP <1E> GROUP Registered
---------------------------------------------
If the computer responded "Host not found" Then either one of two things are the case:
1. You screwed up the host name.
2. The host is not hackable.
If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system.
If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose.
Name - states the share name of that certain part of the computer
<00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on that share name.
Type - Is self-explanatory. It's either turned on, or activated by you, or always on.
Status - Simply states that the share name is working and is activated.
Look above and look for the following line:
GMVPS01 <20> UNIQUE Registered
See it?
GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part)
LMHOST File
7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part:
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:
# #INCLUDE
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
Read this over and over until you understand the way you want your connection to be set. Here's an example of how to add an IP the way I would do it:
#PRE #DOM:255.102.255.102 #INCLUDE
Pre will preload the connection as soon as you log on to the net. DOM is the domain or IP address of the host you are connecting to. INCLUDE will automaticall set you to that file path. In this case as soon as I log on to the net I will get access to 255.102.255.102 on the C:/ drive. The only problem with this is that by doin the NETSTAT command while you are connected, and get the IP of your machine. That's why it only works on simple PC machines. Because people in these days are computer illiterate and have no idea of what these commands can do. They have no idea what NETSTAT is, so you can use that to your advantage. Most PC systems are kind of hard to hack using this method now because they are more secure and can tell when another system is trying to gain access. Also, besure that you (somehow) know whether they are running a firewall or not because it will block the connection to their computer. Most home systems aren't running a firewall, and to make it better, they don't know how operate the firewall, therefore, leaving the hole in the system. To help you out some, it would be a great idea to pick up on some programming languages to show you how the computer reads information and learn some things on TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out whether they are running a firewall, simply hop on a Proxy and do a port scan on their IP. You will notice if they are running a firewall because most ports are closed. Either way, you still have a better chance of hacking a home system than hacking Microsoft.
Gaining Access
7. Once you have added this to you LMHOST file. You are basically done. All you need to do is go to:
Start
Find
Computer
Once you get there you simply type the IP address or the host name of the system. When it comes up, simply double click it, and boom! There's a GUI for you so you don't have to use DOS anymore. You can use DOS to do it, but it's more simple and fun this way, so that's the only way i put it. When you open the system you can edit, delete, rename, do anything to any file you wish. I would also delete the command file in C:/ because they may use it if they think someone is in their computer. Or simply delete the shortcut to it. Then here's when the programming comes in handy. Instead of using the NBTSTAT method all the time, you can then program you own trojan on your OWN port number and upload it to the system. Then you will have easier access and you will also have a better GUI, with more features. DO NOT allow more than one connection to the system unless they are on a faster connection. If you are downloading something from their computer and they don't know it and their connection is being slow, they may check their NETSTAT to see what is connected, which will show your IP and make them suspicious. Thats it. All there is to it. Now go out and scan a network or something and find a computer with port 21 or something open
Introduction
1. Welcome to the basic NETBIOS document created by aCId_rAIn. This document will teach you some simple things about NETBIOS, what it does, how to use it, how to hack with it, and some other simple DOS commands that will be useful to you in the future. THIS DOCUMENT IS FOR NEWBIEZ ONLY!!! If you are NOT a newbie then don't go any farther reading this because if you're smart enough you probably already know it all. So don't waste yourt time reading something that you already know.
1. Hardware and Firmware
1a. The BIOS
The BIOS, short for Basic Input/Output Services, is the control program of the PC. It is responsible for starting up your computer, transferring control of the system to your operating system, and for handling other low-level functions, such as disk access.
NOTE that the BIOS is not a software program, insofar as it is not purged from memory when you turn off the computer. It's
firmware, which is basically software on a chip.

A convenient little feature that most BIOS manufacturers include is a startup password. This prevents access to the system until you enter the correct password.
If you can get access to the system after the password has been entered, then there are numerous software-based BIOS password extractors available from your local H/P/A/V site.

NETBIOS/NBTSTAT - What does it do?
2. NETBIOS, also known as NBTSTAT is a program run on the Windows system and is used for identifying a remote network or computer for file sharing enabled. We can expoit systems using this method. It may be old but on home pc's sometimes it still works great. You can use it on your friend at home or something. I don't care what you do, but remember, that you are reading this document because you want to learn. So I am going to teach you. Ok. So, you ask, "How do i get to NBTSTAT?" Well, there are two ways, but one's faster.
Method 1:Start>Programs>MSDOS PROMPT>Type NBTSTAT
Method 2:Start>Run>Type Command>Type NBTSTAT
(Note: Please, help your poor soul if that isn't like feeding you with a baby spoon.)
Ok! Now since you're in the DOS command under NBTSTAT, you're probably wondering what all that crap is that's on your screen. These are the commands you may use. I'm only going to give you what you need to know since you are striving to be l33t. Your screen should look like the following:
NBTSTAT [ [-a RemoteName] [-A IP address] [-c] [-n]
[-r] [-R] [-RR] [-s] [-S] [interval] ]
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
-c (cache) Lists NBT's cache of remote [machine] names and their IP addresses
-n (names) Lists local NetBIOS names.
-r (resolved) Lists names resolved by broadcast and via WINS
-R (Reload) Purges and reloads the remote cache name table
-S (Sessions) Lists sessions table with the destination IP addresses
-s (sessions) Lists sessions table converting destination IP addresses to computer NETBIOS names.
-RR (ReleaseRefresh) Sends Name Release packets to WINS and then, starts Refresh
RemoteName Remote host machine name.
IP address Dotted decimal representation of the IP address.
interval Redisplays selected statistics, pausing interval seconds between each display. Press Ctrl+C to stop redisplaying
statistics.
C:\WINDOWS\DESKTOP>
The only two commands that are going to be used and here they are:
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Host Names
3. Now, the -a means that you will type in the HOST NAME of the person's computer that you are trying to access. Just in case you don't have any idea what a Host Name looks like here's an example.
123-fgh-ppp.internet.com
there are many variations of these adresses. For each different address you see there is a new ISP assigned to that computer. look at the difference.
abc-123.internet.com
ghj-789.newnet.com
these are differnet host names as you can see, and, by identifying the last couple words you will be able to tell that these are two computers on two different ISPs. Now, here are two host names on the same ISP but a different located server.
123-fgh-ppp.internet.com
567-cde-ppp.internet.com
IP Addresses
4. You can resolce these host names if you want to the IP address (Internet Protocol)
IP addresses range in different numbers. An IP looks like this:
201.123.101.123
Most times you can tell if a computer is running on a cable connection because of the IP address's numbers. On faster connections, usually the first two numbers are low. here's a cable connection IP.
24.18.18.10
on dialup connections IP's are higher, like this:
208.148.255.255
notice the 208 is higher than the 24 which is the cable connection.
REMEMBER THOUGH, NOT ALL IP ADDRESSES WILL BE LIKE THIS.
Some companies make IP addresses like this to fool the hacker into believing it's a dialup, as a hacker would expect something big, like a T3 or an OC-18. Anyway This gives you an idea on IP addresses which you will be using on the nbtstat command.
Getting The IP Through DC (Direct Connection)
5. First. You're going to need to find his IP or host name. Either will work. If you are on mIRC You can get it by typing /whois (nick) ...where (nick) is the persons nickname without parenthesis. you will either get a host name or an IP. copy it down. If you do not get it or you are not using mIRC then you must direct connect to their computer or you may use a sniffer to figure out his IP or host name. It's actually better to do it without the sniffer because most sniffers do not work now-a-days. So you want to establish a direct connection to their computer. OK, what is a direct connection? When you are:
Sending a file to their computer you are directly connected.
AOL INSTANT MESSENGER allows a Direct Connection to the user if accepted.
ICQ when sending a file or a chat request acception allows a direct connection.
Any time you are sending a file. You are directly connected. (Assuming you know the user is not using a proxy server.)
Voice Chatting on Yahoo establishes a direct connection.
If you have none of these programs, either i suggest you get one, get a sniffer, or read this next statement.
If you have any way of sending thema link to your site that enables site traffic statistics, and you can log in, send a link to your site, then check the stats and get the IP of the last visitor. It's a simple and easy method i use. It even fool some smarter hackers, because it catches them off guard. Anyway, once you are directly
connected use either of the two methods i showed you earlier and get into DOS. Type NETSTAT -n. NETSTAT is a program that's name is short for NET STATISTICS. It will show you all computers connected to yours. (This is also helpful if you think you are being hacked by a trojan horse and is on a port that you know such as Sub Seven: 27374.) Your screen should look like this showing the connections to your computer:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 205.188.8.7:26778 ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
The first line indicated the Protocol (language) that is being used by the two computers.
TCP (Transfer Control Protocol) is being used in this and is most widely used.
Local address shows your IP address, or the IP address of the system you on.
Foreign address shows the address of the computer connected to yours.
State tells you what kind of connection is being made ESTABLISHED - means it will stay connected to you as long as you are on the program or as long as the computer is allowing or is needing the other computers connection to it. CLOSE_WAIT means the connection closes at times and waits until it is needed or you resume connection to be made again. One that isn't on the list is TIME_WAIT which means it is timed. Most Ads that run on AOL are using TIME_WAIT states.
the way you know the person is directly connected to your computer is because of this:
------------------------------------------------------------------------------------------------
C:\WINDOWS\DESKTOP>netstat -n
Active Connections
Proto Local Address Foreign Address State
TCP 172.255.255.82:1027 205.188.68.46:13784 ESTABLISHED
TCP 172.255.255.82:1036 205.188.44.3:5190 ESTABLISHED
TCP 172.255.255.82:1621 24.131.30.75:66 CLOSE_WAIT
TCP 172.255.255.82:1413 abc-123-ppp.webnet.com ESTABLISHED
TCP 172.255.255.82:1483 64.4.13.209:1863 ESTABLISHED
C:\WINDOWS\DESKTOP>
------------------------------------------------------------------------------------------------
Notice the host name is included in the fourth line instead of the IP address on all. This is almost ALWAYS, the other computer that is connected to you. So here, now, you have the host name:
abc-123-ppp.webnet.com
If the host name is not listed and the IP is then it NO PROBLEM because either one works exactly the same. I am using abc-123-ppp.webnet.com host name as an example. Ok so now you have the IP and/or host name of the remote system you want to connect to. Time to hack!
Open up your DOS command. Open up NBTSTAT by typing NBTSTAT. Ok, there's the crap again. Well, now time to try out what you have leanred from this document by testing it on the IP and/or host name of the remote system. Here's the only thing you'll need to know.
IMPORTANT, READ NOW!!!
-a (adapter status) Lists the remote machine's name table given its name
-A (Adapter status) Lists the remote machine's name table given its IP address.
Remember this?
Time to use it.
-a will be the host name
-A will be the IP
How do i know this?
Read the Statements following the -a -A commands. It tells you there what each command takes.
So have you found which one you have to use?
GOOD!
Time to start.
Using it to your advantage
6. Type this if you have the host name only.
NBTSTAT -a (In here put in hostname without parenthesis)
Type this is you have the IP address only.
NBTSTAT -A (In here put in IP address without parenthesis)
Now, hit enter and wait. Now Either one of two things came up
1. Host not found
2. Something that looks like this:
--------------------------------------------
NetBIOS Local Name Table
Name Type Status
---------------------------------------------
GMVPS01 <00> UNIQUE Registered
WORKGROUP <00> GROUP Registered
GMVPS01 <03> UNIQUE Registered
GMVPS01 <20> UNIQUE Registered
WORKGROUP <1E> GROUP Registered
---------------------------------------------
If the computer responded "Host not found" Then either one of two things are the case:
1. You screwed up the host name.
2. The host is not hackable.
If number one is the case you're in great luck. If two, This system isn't hackable using the NBTSTAT command. So try another system.
If you got the table as above to come up, look at it carefully as i describe to you each part and its purpose.
Name - states the share name of that certain part of the computer
<00>, <03>, <20>, <1E> - Are the Hexidecimal codes giving you the services available on that share name.
Type - Is self-explanatory. It's either turned on, or activated by you, or always on.
Status - Simply states that the share name is working and is activated.
Look above and look for the following line:
GMVPS01 <20> UNIQUE Registered
See it?
GOOD! Now this is important so listen up. The Hexidecimanl code of <20> means that file sharing is enabled on the share name that is on that line with the hex number. So that means GMVPS01 has file sharing enabled. So now you want to hack this. Here's How to do it. (This is the hard part)
LMHOST File
7. There is a file in all Windows systems called LMHOST.sam. We need to simply add the IP into the LMHOST file because LMHOST basically acts as a network, automatically logging you on to it. So go to Start, Find, FIles or Folders. Type in LMHOST and hit enter. when it comes up open it using a text program such as wordpad, but make sure you do not leave the checkmark to "always open files with this extension" on that. Simply go through the LMHOST file until you see the part:
# This file is compatible with Microsoft LAN Manager 2.x TCP/IP lmhosts
# files and offers the following extensions:
#
# #PRE
# #DOM:
# #INCLUDE
# #BEGIN_ALTERNATE
# #END_ALTERNATE
# \0xnn (non-printing character support)
#
# Following any entry in the file with the characters "#PRE" will cause
# the entry to be preloaded into the name cache. By default, entries are
# not preloaded, but are parsed only after dynamic name resolution fails.
#
# Following an entry with the "#DOM:" tag will associate the
# entry with the domain specified by . This affects how the
# browser and logon services behave in TCP/IP environments. To preload
# the host name associated with #DOM entry, it is necessary to also add a
# #PRE to the line. The is always preloaded although it will not
# be shown when the name cache is viewed.
#
# Specifying "#INCLUDE " will force the RFC NetBIOS (NBT)
# software to seek the specified and parse it as if it were
# local. is generally a UNC-based name, allowing a
# centralized lmhosts file to be maintained on a server.
# It is ALWAYS necessary to provide a mapping for the IP address of the
# server prior to the #INCLUDE. This mapping must use the #PRE directive.
# In addtion the share "public" in the example below must be in the
# LanManServer list of "NullSessionShares" in order for client machines to
# be able to read the lmhosts file successfully. This key is under
# \machine\system\currentcontrolset\services\lanmans erver\parameters\nullsessionshares
# in the registry. Simply add "public" to the list found there.
#
# The #BEGIN_ and #END_ALTERNATE keywords allow multiple #INCLUDE
# statements to be grouped together. Any single successful include
# will cause the group to succeed.
#
# Finally, non-printing characters can be embedded in mappings by
# first surrounding the NetBIOS name in quotations, then using the
# \0xnn notation to specify a hex value for a non-printing character.
Read this over and over until you understand the way you want your connection to be set. Here's an example of how to add an IP the way I would do it:
#PRE #DOM:255.102.255.102 #INCLUDE
Pre will preload the connection as soon as you log on to the net. DOM is the domain or IP address of the host you are connecting to. INCLUDE will automaticall set you to that file path. In this case as soon as I log on to the net I will get access to 255.102.255.102 on the C:/ drive. The only problem with this is that by doin the NETSTAT command while you are connected, and get the IP of your machine. That's why it only works on simple PC machines. Because people in these days are computer illiterate and have no idea of what these commands can do. They have no idea what NETSTAT is, so you can use that to your advantage. Most PC systems are kind of hard to hack using this method now because they are more secure and can tell when another system is trying to gain access. Also, besure that you (somehow) know whether they are running a firewall or not because it will block the connection to their computer. Most home systems aren't running a firewall, and to make it better, they don't know how operate the firewall, therefore, leaving the hole in the system. To help you out some, it would be a great idea to pick up on some programming languages to show you how the computer reads information and learn some things on TCP/IP (Transfer Control Protocol/Internet Protocol) If you want to find out whether they are running a firewall, simply hop on a Proxy and do a port scan on their IP. You will notice if they are running a firewall because most ports are closed. Either way, you still have a better chance of hacking a home system than hacking Microsoft.
Gaining Access
7. Once you have added this to you LMHOST file. You are basically done. All you need to do is go to:
Start
Find
Computer
Once you get there you simply type the IP address or the host name of the system. When it comes up, simply double click it, and boom! There's a GUI for you so you don't have to use DOS anymore. You can use DOS to do it, but it's more simple and fun this way, so that's the only way i put it. When you open the system you can edit, delete, rename, do anything to any file you wish. I would also delete the command file in C:/ because they may use it if they think someone is in their computer. Or simply delete the shortcut to it. Then here's when the programming comes in handy. Instead of using the NBTSTAT method all the time, you can then program you own trojan on your OWN port number and upload it to the system. Then you will have easier access and you will also have a better GUI, with more features. DO NOT allow more than one connection to the system unless they are on a faster connection. If you are downloading something from their computer and they don't know it and their connection is being slow, they may check their NETSTAT to see what is connected, which will show your IP and make them suspicious. Thats it. All there is to it. Now go out and scan a network or something and find a computer with port 21 or something open

Wednesday, August 11, 2010
how to use Metasploit over the internet
Now I read security forums and especially the Backtrack forum and I see a lot of questions about how to use Metasploit over the internet, well here is a quick way to use it using port forwarding. This may be different for every router, you’ll figure it out.
ZOOM THE IMAGES FOR BETTER QUALITY!!!
1. Let’s enter our router homepage:

2. We go to the port forwarding option (In my case “Game & Application Sharing”):

3. Let us add a new Game/Application name “Metasploit_example” and select to manual enter the ports:

4. Enter the reverse port of your payload and the port on which the router should forward it to your IP and click “Add”:

5. Now let’s enable the Game/Application, go to the Game & Application Sharing tab, select “Assign a game or application to a local network device”, select the application “Metasploit_example” and at the device you either select it with the device names or either click on the list and select “” in that case a small window should pop-up where you can add your internal IP manually:

6. Create the payload, using your external IP as LHOST:

7. Open up msfconsole, use the multi/handler exploit and the payload that you selected in the previous step.This time set your LHOST to your internal IP:

8. We have a shell !!:

Now a few tips in case this doesn’t work:
***Turn off your firewall.
***Check if the victims firewall blocks the reverse shell.
***Check your router firewall settings.
Some nice credits go to my friend Vlad who helped me make this test over the internet by being the victim.
I AM NOT RESPONSIBLE FOR WHAT YOU STUPID AND MINDLESS HAX0RS DO WITH THIS KNOWLEDGE !!!!!!
ZOOM THE IMAGES FOR BETTER QUALITY!!!
1. Let’s enter our router homepage:

2. We go to the port forwarding option (In my case “Game & Application Sharing”):

3. Let us add a new Game/Application name “Metasploit_example” and select to manual enter the ports:

4. Enter the reverse port of your payload and the port on which the router should forward it to your IP and click “Add”:

5. Now let’s enable the Game/Application, go to the Game & Application Sharing tab, select “Assign a game or application to a local network device”, select the application “Metasploit_example” and at the device you either select it with the device names or either click on the list and select “

6. Create the payload, using your external IP as LHOST:

7. Open up msfconsole, use the multi/handler exploit and the payload that you selected in the previous step.This time set your LHOST to your internal IP:

8. We have a shell !!:

Now a few tips in case this doesn’t work:
***Turn off your firewall.
***Check if the victims firewall blocks the reverse shell.
***Check your router firewall settings.
Some nice credits go to my friend Vlad who helped me make this test over the internet by being the victim.
I AM NOT RESPONSIBLE FOR WHAT YOU STUPID AND MINDLESS HAX0RS DO WITH THIS KNOWLEDGE !!!!!!
Category: HDD tools
Please register or login to download files from this category.
Files:
![]() |
Windows 2000 introduces the Encrypting File System (EFS) so that users can protect their sensitive data. Several new APIs make their debut to support this factility, including one - QueryUsersOnEncryptedFile - that lets you see who has access to encrypted files. This applet uses the API to show you what accounts are authorized to access encrypted files. Full source code is included. | Date File size Hits | 2010-07-21 20.93 KB 0 | ||
![]() |
Use NTFSInfo to see detailed information about NTFS volumes, including the size and location of the Master File Table (MFT) and MFT-zone, as well as the sizes of the NTFS meta-data files. | Date File size Hits | 2010-07-21 28.79 KB 0 | ||
![]() |
Provides Windows NT4.0/2000/XP with full access to Linux Ext2 volumes (read access and write access). This may be useful if you have installed both Windows and Linux as a dual boot environment on your computer. (Ext3 volumes can be accessed too, for a howto please check the homepage) | Date File size Hits | 2010-07-21 439.07 KB 0 | ||
![]() |
Wipe disk overwrites the data sector by sector, from the beginning until the end of the selected disk. This is particularly Wipe disc for the proper forensic deletion of data sources. | Date File size Hits | 2010-07-21 341.8 KB 2 | ||
![]() |
While the flexible security model employed by Windows NT-based systems allows full control over security and file permissions, managing permissions so that users have appropriate access to files, directories and Registry keys can be difficult. There's no built-in way to quickly view user accesses to a tree of directories or keys. AccessEnum gives you a full view of your file system and Registry security settings in seconds, making it the ideal tool for helping you for security holes and lock down permissions where necessary. | Date File size Hits | 2010-07-21 105.16 KB 0 | ||
![]() |
Partition Table Editor is an tool for exploring the master partition table, extended partition tables, and the boot record parameter tables in each boot sector. Caution: Ptedit is a DOS program with a user-friendly graphical interface, but is not made to be used without a mouse. To use ptedit, boot to DOS, load a DOS mouse driver, and then launch ptedit.) | Date File size Hits | 2010-07-21 397.32 KB 2 | ||
![]() |
This utility captures all hard disk activity or acts like a software disk activity light in your system tray. | Date File size Hits | 2010-07-21 56.88 KB 3 | ||
![]() |
Tool to unlock password protected HDDs. | Date File size Hits | 2010-07-21 17.57 KB 7 | ||
![]() |
Du (disk usage) reports the disk space usage for the directory you specify. By default it recurses directories to show the total size of a directory and its subdirectories. | Date File size Hits | 2010-07-21 17.77 KB 1 | ||
![]() |
Tool to unlock password protected HDDs. | Date File size Hits | 2010-07-21 9.8 KB 1 | ||
![]() |
Display volume disk-mappings. | Date File size Hits | 2010-07-21 19.77 KB 1 | ||
![]() |
DiskView shows you a graphical map of your disk, allowing you to determine where a file is located or, by clicking on a cluster, seeing which file occupies it. Double-click to get more information about a file to which a cluster is allocated. Diskview works on Windows NT 4, 2000, XP and Server 2003. | Date File size Hits | 2010-07-21 64.28 KB 3 | ||
Tuesday, August 10, 2010
Interesting Information Security Bits for 08/11/2010
Here are today's Interesting Information Security Bits from around the web.
This infomations by Kevin Riggins
- F-Secure describes a way to install the .lnk update on Windows XP SP2.
How to Install LNK Update (KB2286198) on Windows XP SP2 - F-Secure Weblog : News from the Lab
Tags: ( xp patches ) - Happy blog birthday to Andy!
4th Anniversary of the blog >> Andy ITGuy - Information Security Blog
Tags: ( general ) - Here is part 1of Chad Tilbury's review of Access Data's Forensic Toolkit Version 3 (FTK.)
Review: Access Data Forensic Toolkit (FTK) Version 3 -- Part 1
Tags: ( forensics ftk tools ) - For the math and computational logic geeks out there, the P vs. NP problem has potentially been solved. Vinay Deolalikar has published a paper proving that P != NP. Apparently, it has not been peer reviewed yet, so take it with a grain of salt.
P != NP
Tags: ( math )
This infomations by Kevin Riggins
Backtrack 4: Information Gathering: Searchengine: The Harvester – Email, User Names, Subdomain & Hostnames Finder
The next tool on Backtrack 4 I am going to review is The Harvester which was written by the guys over at Edge Security. The Harvester is a tool for gathering e-mail accounts, user names and hostnames/subdomains from different public sources. It’s a really simple tool, but very effective.
The supported sources are:
Lets take a look at the options which are available:
Code:
Lets use cnn.com as a example:
Code:
So as you can see from this search we were able to get a lot of possible subdomains but not very many email address’s. This is one reason its important to run your query on all available search engines.
Lets show a example which will show a few more email address’s:
Code:
Using this example we got a lot more results, for example we now know that most likely all the email address’s will follow the following naming convention, firstname.lastname@53.com. This can be a very useful piece of knowledge because as long as we have a first and last name of any one at 53rd bank, we have their email address.
This is just one of the may tools which can aid a penetration tester in the passive reconnaissance process.
The supported sources are:
- Google – emails,subdomains/hostnames
- Bing search – emails, subdomains/hostnames
- Pgp servers – emails, subdomains/hostnames
- Linkedin – user names
Lets take a look at the options which are available:
Code:
01 root@666:/pentest/enumeration/google/theharvester# ./theHarvester.py 02 03 ************************************* 04 *TheHarvester Ver. 1.6 * 05 *Coded by Christian Martorella * 06 *Edge-Security Research * 07 *cmartorella@edge-security.com * 08 ************************************* 09 10 Usage: theharvester options 11 12 -d: domain to search or company name 13 -b: data source (google,bing,pgp,linkedin) 14 -s: start in result number X (default 0) 15 -v: verify host name via dns resolution 16 -l: limit the number of results to work with(bing goes from 50 to 50 results, 17 google 100 to 100, and pgp does'nt use this option) 18 19 Examples:./theharvester.py -d microsoft.com -l 500 -b google 20 ./theharvester.py -d microsoft.com -b pgp 21 ./theharvester.py -d microsoft -l 200 -b linkedin
Code:
01 root@666:/pentest/enumeration/google/theharvester# ./theHarvester.py -d cnn.com -l 500 -b bing 02 03 ************************************* 04 *TheHarvester Ver. 1.6 * 05 *Coded by Christian Martorella * 06 *Edge-Security Research * 07 *cmartorella@edge-security.com * 08 ************************************* 09 10 Searching for cnn.com in bing : 11 ====================================== 12 13 Limit: 500 14 Searching results: 0 15 Searching results: 50 16 Searching results: 100 17 Searching results: 150 18 Searching results: 200 19 Searching results: 250 20 Searching results: 300 21 Searching results: 350 22 Searching results: 400 23 Searching results: 450 24 25 Accounts found: 26 ==================== 27 28 @cnn.com 29 cnnfutures@cnn.com 30 ==================== 31 32 Total results: 2 33 34 Hosts found: 35 ==================== 36 37 www.cnn.com 38 edition.cnn.com 39 money.cnn.com 40 sportsillustrated.cnn.com 41 amfix.blogs.cnn.com 42 live.cnn.com 43 news.blogs.cnn.com 44 politicalticker.blogs.cnn.com 45 marquee.blogs.cnn.com 46 weather.cnn.com 47 m.cnn.com 48 transcripts.cnn.com 49 www.cnnstudentnews.cnn.com 50 ac360.blogs.cnn.com 51 campbellbrown.blogs.cnn.com 52 newsource.cnn.com 53 cgi.cnn.com 54 joybehar.blogs.cnn.com 55 topics.edition.cnn.com 56 internationaldesk.blogs.cnn.com 57 us.cnn.com 58 larrykinglive.blogs.cnn.com 59 topics.cnn.com 60 weather.edition.cnn.com 61 cnnwire.blogs.cnn.com 62 scitech.blogs.cnn.com 63 on.cnn.com 64 ricksanchez.blogs.cnn.com 65 archives.cnn.com 66 community.cnn.com 67 sports.si.cnn.com 68 arabic.cnn.com 69 quiz.cnn.com 70 newsroom.blogs.cnn.com 71 cgi.money.cnn.com 72 partners.cnn.com 73 pagingdrgupta.blogs.cnn.com 74 features.blogs.fortune.cnn.com 75 tech.fortune.cnn.com 76 insession.blogs.cnn.com 77 business.blogs.cnn.com 78 behindthescenes.blogs.cnn.com 79 olympics.blogs.cnn.com 80 afghanistan.blogs.cnn.com 81 gdyn.cnn.com 82 premium.cnn.com 83 inthefield.blogs.cnn.com 84 ypwr.blogs.cnn.com 85 premium.edition.cnn.com 86 edition1.cnn.com 87 drgupta.cnn.com 88 edition2.cnn.com 89 wallstreet.blogs.fortune.cnn.com 90 tips.blogs.cnn.com 91 mxp.blogs.cnn.com
Lets show a example which will show a few more email address’s:
Code:
01 root@666:/pentest/enumeration/google/theharvester# ./theHarvester.py -d 53.com -l 500 -b google 02 03 ************************************* 04 *TheHarvester Ver. 1.6 * 05 *Coded by Christian Martorella * 06 *Edge-Security Research * 07 *cmartorella@edge-security.com * 08 ************************************* 09 10 Searching for 53.com in google : 11 ====================================== 12 13 Limit: 500 14 Searching results: 0 15 Searching results: 100 16 Searching results: 200 17 Searching results: 300 18 Searching results: 400 19 20 Accounts found: 21 ==================== 22 23 josh.paskewicz@53.com 24 @53.com 25 info@tapioles53.com 26 @.53.com 27 rachael.smith@53.com 28 nan.horton@53.com 29 aler...@53.com 30 alertingservice@53.com 31 j.brinkman@53.com 32 Jerome.Gilbert@53.com 33 Gilbert@53.com 34 michelle.weddington@53.com 35 ==================== 36 37 Total results: 12 38 39 Hosts found: 40 ==================== 41 42 www.53.com 43 reo.53.com 44 direct.53.com 45 premierissue.53.com 46 retire.53.com 47 ir.53.com 48 tdsc.53.com 49 secure.53.com 50 ra.53.com 51 2Fwww.53.com 52 Www.53.com 53 252Fwww.53.com 54 espanol.53.com 55 employee.53.com 56 bnjhz.php?...53.com 57 express.53.com 58 www.ra.53.com 59 Ra.53.com 60 3Dreo.53.com 61 wwww.53.com 62 Retire.53.com 63 @.53.com 64 www.express.53.com 65 mxism.php?...53.com 66 pngyo.php?...53.com
This is just one of the may tools which can aid a penetration tester in the passive reconnaissance process.
Wordlist Menu Tool for Backtrack 4 Final
I get really sick of trying to remember all the commands I use to work with wordlists so I had some free time and decided to finally get it all in one place. I started out just gathering all my notes in a text file but then I decided to code up a menu to make the commands easy to access. Normally I would keep something like this just for my own use since I doubt any one would want it but I decided to release it anyway.
Since I develop for Backtrack Linux I did code this to work on Backtrack 4 final. It would be fairly easy to convert this to work on any distro though provided you had all the dependencies. The file paths would have to be corrected but other than that it should work fine.
The tools you would need to meet the depends are:
Here is a screen shot of the menu:
Changelog:
I added 3 new options to the menu
The script was getting to big for the post so it is now available in our tools section:
http://tools.question-defense.com/wordlist_tools.sh
Since I develop for Backtrack Linux I did code this to work on Backtrack 4 final. It would be fairly easy to convert this to work on any distro though provided you had all the dependencies. The file paths would have to be corrected but other than that it should work fine.
The tools you would need to meet the depends are:
- Wyd.pl
- Crunch
- CUPP
- Pw-inspector (part of hydra)
- sed , cat , tr (all standard on most linux distros)
Here is a screen shot of the menu:
Changelog:
I added 3 new options to the menu
- Combine a directory full of text files into one big text file
- Split one large file in to many small files based on line number
- Capitalize the first letter of first word on each line in a list
The script was getting to big for the post so it is now available in our tools section:
http://tools.question-defense.com/wordlist_tools.sh
Install Backtrack 4 On Windows 7 In A Virtual Machine Using Windows Virtual PC
I have been using a Windows 7 laptop for quite awhile as my daily driver and recently wanted to install Backtrack 4 in a virtual machine so I wasn’t required to dual boot or use a different laptop for BT4. I thought about using VMware as Martin wrote an article a couple months ago about installing Backtrack in a VM on Windows 7 but a couple months ago I discovered Windows Virtual PC during a Windows XP VM install. So far I have been really happy with Windows Virtual PC and decided to try installing Backtrack 4 in a Windows Virtual PC virtual machine. Below are the details on how to setup the Windows Virtual PC virtual machine and then information on how to install Backtrack 4 in that VM.
Install Backtrack 4 On Windows 7 In A Virtual Machine Using Windows Virtual PC:
Install Backtrack 4 On Windows 7 In A Virtual Machine Using Windows Virtual PC:
- Download Backtrack: First you will need to download the Backtrack 4 ISO image file from the Backtrack downloads page which is located here.
- Burn Backtrack ISO: Burn the Backtrack ISO image using your favorite DVD burning software. In this example I used Roxio to burn the Backtrack 4 ISO image so if you are using Roxio launch the Roxio Creater Home application first. Once Roxio is launched click Copy in the left navigation to display the options below as shown in the example below.
Once the menu is expanded it will display the option we need which is Burn Image. So click on Burn Image to display the below window within Roxio where you will first browse to the Backtrack 4 ISO file and then click the circle button in the bottom right corner to burn the Backtrack 4 image to a DVD.
- Launch Windows Virtual PC: Cick the Windows icon in the lower left hand corner of your Windows 7 PC to launch the Start Menu. Type “Windows Virtual PC” into the search box as displayed in the below example image.
Once Windows Virtual PC displays in the start menu click it to launch Windows Virtual PC which will display the Windows Virtual PC management window.
- Start Virtual Machine Creation: Click the Create Virtual Machine button in the top navigation bar of the Windows Virtual PC management window to launch the Create A Virtual Machine window as displayed in the below example image.
Give the virtual machine a name similar to BT4 or BackTrack4, verify the path is correct, and then click the Next button.
- Specify Memory & Networking Options: The next window in virtual machine creation will be where memory is assigned and you specify if the VM should be able to use the computers network connections. I will be using Backtrack 4 fairly heavily and I have plenty of RAM to spare so I am allowing the BT4 VM to use 2GB of memory as displayed in the below image.
We also leave the check in the check box so the VM can use the Windows networking connections. Once you have made the proper configuration changes click the Next button on the “Specify Memory and Networking Options” window.
- Add A Virtual Disk: The next window in the VM creation process is where you decide how the disk will be created and if the VM will use the Undo Disks feature. In this example with Backtrack 4 being installed we want to select the radio button next to “Create A Virtual Hard Disk Using Adavanced Options” and turn on the Undo Disks feature as shown in the below example image.
The Undo Disk feature allows you to make changes to a single VM without applying those changes to all VM’s by storing those changes in a .VUD file which is a file that holds changes to a specific VM. After you have made the proper configuration changes click the Next button to continue.
- Select VM Disk Type: After the Next button was clicked above you will be taken to the “Choose the type of virtual hard disk to create” window which is where you will decide to create a fixed disk or a virtually expanding disk. In this example we will be creating a Fixed Disk for the Backtrack 4 Virtual Machine.
Click the Fixed Size option to continue on.
- VM Name & Location: After selecting Fixed Size you will now verify the name and location of the Fixed Size virtual machine again as shown in the below example image. Verify both the name and virtual machine location are correct and click the Next button.
- Virtual Hard Disk Size: The next window displayed in virtual machine creation is where the size of the virtual hard disk will be specified. For this example I have decided to make the Backtrack 4 VM have a 15GB fixed disk which equates to 15,360 MB as shown in the below example image.
If you want to make a different size fixed disk simply multiple the amount of GB’s you would like the disk to have by 1024 MB and enter the number in the Size field. After making the selection click the Create button to generate the fixed virtual hard disk for the Backtrack 4 virtual machine. This will begin the virtual hard disk creation as displayed in the image below which depending on the size of the disk could take awhile.
Once the virtual machine has been created successfully the below window will display which can be closed.
- Begin Backtrack 4 Installation: Double click on the BT4 VM from the Virtual. Insert Backtrack 4 DVD created in step 2. Click the “Ctrl-Alt-Del” button at the top of the VM.
- Follow Article Directions: Purehate has already created directions for installing into a VM so visit this article and follow the “Installing Backtrack” section to continue the installation from the Backtrack 4 DVD boot screen.
Wednesday, July 28, 2010
sqlninja v0.2.5 Released – Microsoft SQL Server (MS-SQL) SQL Injection Vulnerability Tool
It’s been 2 years, but a new version of sqlninja is out at Sourceforge, we wrote about the previous release back in 2008 and we’ve actually been following this tool since 2006!
Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide an interactive access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.
Features
It is written in Perl, it is released under the GPLv2 and so far has been successfully tested on:
Sqlninja is a tool to exploit SQL Injection vulnerabilities on a web application that uses Microsoft SQL Server as its back-end. Its main goal is to provide an interactive access on the vulnerable DB server, even in a very hostile environment. It should be used by penetration testers to help and automate the process of taking over a DB Server when a SQL Injection vulnerability has been discovered.
Features
- Fingerprint of the remote SQL Server (version, user performing the queries, user privileges, xp_cmdshell availability, DB authentication mode)
- Bruteforce of ‘sa’ password (in 2 flavors: dictionary-based and incremental)
- Privilege escalation to sysadmin group if ‘sa’ password has been found
- Creation of a custom xp_cmdshell if the original one has been removed
- Upload of netcat (or any other executable) using only normal HTTP requests (no FTP/TFTP needed)
- TCP/UDP portscan from the target SQL Server to the attacking machine, in order to find a port that is allowed by the firewall of the target network and use it for a reverse shell
- Direct and reverse bindshell, both TCP and UDP
- DNS-tunneled pseudo-shell, when no TCP/UDP ports are available for a direct/reverse shell, but the DB server can resolve external hostnames
- Evasion techniques to confuse a few IDS/IPS/WAF
- Integration with Metasploit3, to obtain a graphical access to the remote DB server through a VNC server injection
- Proxy support (it was about time!)
- No more 64k bytes limit in upload mode
- Upload mode is also massively faster
- Privilege escalation through token kidnapping (kudos to Cesar Cerrudo)
- Other minor improvements
It is written in Perl, it is released under the GPLv2 and so far has been successfully tested on:
- Linux
- FreeBSD
- Mac OS X
How to execute PERL(pl) exploits..
Step one:
Download ActivePerl, but clicking the link below:
Step two:
After the installation will several folders be created in the C:\ (I'm assuming you all who read this tutorial use Windows But don't mind those folders, they are sorta "useless" for your kinda use of Perl.
Step three:
Go find a perl exploit script, then put the exploit in notepad and save it in C:\exploit.pl
Step four:
Now to actually run the script. Go to "START" and then press "RUN", when you are in "RUN", write "CMD" to get into the "COMMAND PROMPT". When you open it you usually start in "DOCUMENTS AND SETTINGS", write "CD\" to get to C.\. Then write exploit.pl to start the script. (You will get further description, when you run the script)
This will be useful later on when you start using xploits!
Download ActivePerl, but clicking the link below:
Code:
http://downloads.activestate.com/ActivePerl/releases/5.10.1.1007/ActivePerl-5.10.1.1007-MSWin32-x64-291969.msi
Step two:
After the installation will several folders be created in the C:\ (I'm assuming you all who read this tutorial use Windows But don't mind those folders, they are sorta "useless" for your kinda use of Perl.
Step three:
Go find a perl exploit script, then put the exploit in notepad and save it in C:\exploit.pl
Step four:
Now to actually run the script. Go to "START" and then press "RUN", when you are in "RUN", write "CMD" to get into the "COMMAND PROMPT". When you open it you usually start in "DOCUMENTS AND SETTINGS", write "CD\" to get to C.\. Then write exploit.pl to start the script. (You will get further description, when you run the script)
This will be useful later on when you start using xploits!
Subscribe to:
Posts (Atom)